Ebook: Computer Security – ESORICS 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings
Author: Michael P. Collins Michael K. Reiter (auth.) Dieter Gollmann Jan Meier Andrei Sabelfeld (eds.)
- Tags: Data Encryption, Operating Systems, Computer Communication Networks, Database Management, Management of Computing and Information Systems, Computers and Society
- Series: Lecture Notes in Computer Science 4189
- Year: 2006
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006, held in Hamburg, Germany, in September 2006.
The 32 revised full papers presented were carefully reviewed and selected from 160 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006, held in Hamburg, Germany, in September 2006.
The 32 revised full papers presented were carefully reviewed and selected from 160 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.
Content:
Front Matter....Pages -
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors....Pages 1-17
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses....Pages 18-33
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards....Pages 34-48
Private Information Retrieval Using Trusted Hardware....Pages 49-64
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components....Pages 65-80
License Transfer in OMA-DRM....Pages 81-96
Enhanced Security Architecture for Music Distribution on Mobile....Pages 97-109
A Formal Model of Access Control for Mobile Interactive Devices....Pages 110-126
Discretionary Capability Confinement....Pages 127-144
Minimal Threshold Closure....Pages 145-155
Reducing the Dependence of SPKI/SDSI on PKI....Pages 156-173
Delegation in Role-Based Access Control....Pages 174-191
Applying a Security Requirements Engineering Process....Pages 192-206
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System....Pages 207-224
A Formal Framework for Confidentiality-Preserving Refinement....Pages 225-242
Timing-Sensitive Information Flow Analysis for Synchronous Systems....Pages 243-262
HBAC: A Model for History-Based Access Control and Its Model Checking....Pages 263-278
From Coupling Relations to Mated Invariants for Checking Information Flow....Pages 279-296
A Linear Logic of Authorization and Knowledge....Pages 297-312
Pr?t ? Voter with Re-encryption Mixes....Pages 313-326
Secure Key-Updating for Lazy Revocation....Pages 327-346
Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems....Pages 347-361
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos....Pages 362-383
Deriving Secrecy in Key Establishment Protocols....Pages 384-403
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes....Pages 404-423
Conditional Reactive Simulatability....Pages 424-443
SessionSafe: Implementing XSS Immune Session Handling....Pages 444-460
Policy-Driven Memory Protection for Reconfigurable Hardware....Pages 461-478
Privacy-Preserving Queries on Encrypted Data....Pages 479-495
Analysis of Policy Anomalies on Distributed Network Security Setups....Pages 496-511
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks....Pages 512-526
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems....Pages 527-546
Back Matter....Pages -
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006, held in Hamburg, Germany, in September 2006.
The 32 revised full papers presented were carefully reviewed and selected from 160 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.
Content:
Front Matter....Pages -
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors....Pages 1-17
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses....Pages 18-33
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards....Pages 34-48
Private Information Retrieval Using Trusted Hardware....Pages 49-64
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components....Pages 65-80
License Transfer in OMA-DRM....Pages 81-96
Enhanced Security Architecture for Music Distribution on Mobile....Pages 97-109
A Formal Model of Access Control for Mobile Interactive Devices....Pages 110-126
Discretionary Capability Confinement....Pages 127-144
Minimal Threshold Closure....Pages 145-155
Reducing the Dependence of SPKI/SDSI on PKI....Pages 156-173
Delegation in Role-Based Access Control....Pages 174-191
Applying a Security Requirements Engineering Process....Pages 192-206
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System....Pages 207-224
A Formal Framework for Confidentiality-Preserving Refinement....Pages 225-242
Timing-Sensitive Information Flow Analysis for Synchronous Systems....Pages 243-262
HBAC: A Model for History-Based Access Control and Its Model Checking....Pages 263-278
From Coupling Relations to Mated Invariants for Checking Information Flow....Pages 279-296
A Linear Logic of Authorization and Knowledge....Pages 297-312
Pr?t ? Voter with Re-encryption Mixes....Pages 313-326
Secure Key-Updating for Lazy Revocation....Pages 327-346
Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems....Pages 347-361
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos....Pages 362-383
Deriving Secrecy in Key Establishment Protocols....Pages 384-403
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes....Pages 404-423
Conditional Reactive Simulatability....Pages 424-443
SessionSafe: Implementing XSS Immune Session Handling....Pages 444-460
Policy-Driven Memory Protection for Reconfigurable Hardware....Pages 461-478
Privacy-Preserving Queries on Encrypted Data....Pages 479-495
Analysis of Policy Anomalies on Distributed Network Security Setups....Pages 496-511
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks....Pages 512-526
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems....Pages 527-546
Back Matter....Pages -
....